Introduction to Cybersecurity

Information system security


overall satisfaction for this course

?Average calculated from scores obtained from 270 participants who took this course.
  • Duration 1 day
  • Regular fee 510
  • Preferential fee 460?
  • Locations


To provide the knowledge and skills required to evaluate security risks inherent in information systems (workstations, servers, LAN, WAN, intranets, extranets and the Internet), and to identify the measures and policies to be implemented.

Targeted audience

Those in network positions, IT management positions, project management positions, management positions and those seeking vocational retraining.


Knowledge of computer science.

Training Details


  • Identifying risks and threats
  • In-depth defense: gatekeeper, intrusion detection system and decoy systems (honeypots)
  • Protecting wireless networks: safely accessing internal resources using virtual private networks
  • Managing authentication (password management and two-factor authentication)
  • Security of applications, Web sites, application servers and databases, workstations, mobile devices and connected objects
  • Better practices/critical security controls according to CIS; Standardized approach: ISO 2700x standards
  • Risk analysis, security methods, the role of audits and implementation
  • Putting people at the heart of security: organizing the security channel; awareness
  • Managing security incidents: preventive action plan and proper responses
  • Security and outsourcing
  • Security and Cloud Computing

General Note

Note: ISO 27001, 27002 and 27005 norms are covered in detail in Course RE201 (27001/27002).

Customer Testimonials

Gives a good general view of information systems security.

Florence C. / Directrice des technologies et services, UNI Coopération financière

Are you interested in this training course ?

Only private sessions of this course are currently available (8 participants minimum).

Request a quote

Trainer(s) assigned(s)